Aggelos Kiayias
Orcid: 0000-0001-8501-3633Affiliations:
- University of Edinburgh, UK
According to our database1,
Aggelos Kiayias
authored at least 258 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates.
J. Cryptol., June, 2024
Proc. Priv. Enhancing Technol., 2024
SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Algorithmic Game Theory - 17th International Symposium, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security.
Quantum, March, 2023
Frontiers Digit. Health, March, 2023
IACR Cryptol. ePrint Arch., 2023
Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions.
IACR Cryptol. ePrint Arch., 2023
Fait Accompli Committee Selection: Improving the Size-Security Tradeoff of Stake-Based Committees.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Web and Internet Economics - 19th International Conference, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Watermarkable Public key Encryption With Efficient Extraction Under Standard Assumptions.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Algorithmic Game Theory - 15th International Symposium, 2022
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022
Proceedings of the 3rd ACM International Conference on AI in Finance, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Watermarking public-key cryptographic functionalities and implementations: The case of encryption and signatures.
IET Inf. Secur., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work \\ A Provably Secure Blockchain Protocol.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2021
Proceedings of the AFT '21: 3rd ACM Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search.
CoRR, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Comput. Secur., 2019
Proceedings of the International Conference on Blockchain Economics, 2019
Proceedings of the International Conference on Blockchain Economics, 2019
Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy, 2019
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Provable Security, 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Encrypting wireless network traces to protect user privacy: A case study for smart campus.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proc. Priv. Enhancing Technol., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
J. Cryptol., 2014
IACR Cryptol. ePrint Arch., 2014
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
IACR Cryptol. ePrint Arch., 2014
A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014
Proceedings of the Information Security - 17th International Conference, 2014
Pressing the button for European elections: verifiable e-voting and public attitudes toward internet voting in Greece.
Proceedings of the 6th International Conference on Electronic Voting: Verifying the Vote, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Theor. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the E-Voting and Identify - 4th International Conference, 2013
Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the E-Democracy, Security, Privacy and Trust in a Digital World, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Distributed Computing - 26th International Symposium, 2012
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 27th International Conference on Data Engineering, 2011
Proceedings of the Fourth European Workshop on System Security, 2011
On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011
2010
Advances in Information Security 52, Springer, ISBN: 978-1-4419-0043-2, 2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the Distributed Computing, 23rd International Symposium, 2009
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the Automata, Languages and Programming, 36th Internatilonal Colloquium, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
On the security of a public-key traitor tracing scheme with sublinear ciphertext size.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
IEEE Trans. Inf. Theory, 2008
IACR Cryptol. ePrint Arch., 2008
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
2007
Theor. Comput. Sci., 2007
IACR Cryptol. ePrint Arch., 2007
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice.
Des. Codes Cryptogr., 2007
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Int. J. Secur. Networks, 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
2004
Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Advances in Cryptology, 2004
2003
Robust Verifiable non-Interactive Zero-Sharing - A Plug-in Utility for Enhanced Voters' Privacy.
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the Automata, Languages and Programming, 30th International Colloquium, 2003
Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Proceedings of the Financial Cryptography, 2003
Proceedings of the Advances in Cryptology, 2003
2002
Electron. Colloquium Comput. Complex., 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Advances in Informatics, 8th Panhellenic Conference on Informatics, 2001
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Security and Privacy in Digital Rights Management, 2001